Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15193: Buffer Overflow in D-Link DWR-M920

0
High
VulnerabilityCVE-2025-15193cvecve-2025-15193
Published: Mon Dec 29 2025 (12/29/2025, 15:02:08 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DWR-M920

Description

A vulnerability was detected in D-Link DWR-M920 up to 1.1.50. This affects the function sub_423848 of the file /boafrm/formParentControl. Performing manipulation of the argument submit-url results in buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 12/30/2025, 23:39:56 UTC

Technical Analysis

CVE-2025-15193 is a critical buffer overflow vulnerability identified in the D-Link DWR-M920 router firmware versions 1.1.0 through 1.1.50. The vulnerability resides in the function sub_423848 located in the /boafrm/formParentControl file. Specifically, the issue arises from improper handling of the 'submit-url' parameter, which can be manipulated to overflow a buffer. This overflow can lead to arbitrary code execution with elevated privileges, as the router firmware likely runs with high system rights. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, making it highly accessible to attackers. The CVSS 4.0 score of 8.7 reflects the ease of exploitation (network vector, low complexity), lack of required privileges or user interaction, and the high impact on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, the public availability of exploit code significantly raises the threat level. The DWR-M920 is a widely deployed 4G LTE router used in various enterprise and industrial environments, making this vulnerability particularly concerning. Attackers exploiting this flaw could gain persistent control over the device, intercept or manipulate network traffic, disrupt connectivity, or use the device as a foothold for lateral movement within networks.

Potential Impact

For European organizations, the impact of CVE-2025-15193 is substantial. Compromise of D-Link DWR-M920 routers could lead to unauthorized access to internal networks, interception of sensitive communications, and disruption of critical services relying on these devices for connectivity. Industrial and enterprise sectors using these routers for remote or mobile network access are at heightened risk of operational downtime and data breaches. Given the router’s role as a network gateway, attackers could pivot to other internal systems, escalating the severity of the breach. The public exploit availability increases the likelihood of targeted attacks or opportunistic scanning campaigns across Europe. Organizations in sectors such as manufacturing, logistics, telecommunications, and public services that deploy these routers may face significant operational and reputational damage if exploited. Additionally, the lack of patches or delayed patching could prolong exposure, especially in environments where firmware updates are challenging to deploy rapidly.

Mitigation Recommendations

1. Immediate firmware update: Organizations should verify if D-Link has released a patch or updated firmware beyond version 1.1.50 and apply it promptly. 2. Disable remote management interfaces on the DWR-M920 to reduce attack surface. 3. Implement network segmentation to isolate vulnerable routers from critical internal networks. 4. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts targeting the 'submit-url' parameter or related traffic anomalies. 5. Monitor network traffic for unusual patterns or spikes in requests to the /boafrm/formParentControl endpoint. 6. Where patching is not immediately feasible, consider temporary compensating controls such as firewall rules blocking external access to router management ports. 7. Conduct regular vulnerability scanning and penetration testing focusing on network edge devices. 8. Educate IT staff on the risks and signs of exploitation to enable rapid incident response. 9. Maintain an inventory of all deployed DWR-M920 devices to ensure comprehensive coverage of mitigation efforts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-28T09:10:14.904Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450badb813ff03e2bf7bd

Added to database: 12/30/2025, 10:22:50 PM

Last enriched: 12/30/2025, 11:39:56 PM

Last updated: 2/7/2026, 7:56:56 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats